Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.
Introduction to 802.1X Operations for Cisco Security Professionals (802.1X) v1.0 shows you how to configure and prepare to deploy Cisco® Identity-Based Networking Services (IBNS) solutions based on Cisco Identity Services Engine (ISE), Cisco Catalyst switches, and Cisco Wireless LAN Controllers.
You will learn the fundamentals of the 802.1X protocol and configuration, Cisco IBNS, configuring access for non-supplicant devices, Cisco ISE deployment options, architectural components, considerations with 802.1X, and more. You will also gain hands-on experience configuring 802.1X–based network services using the Cisco Identity Services Engine and a Cisco Catalyst switch.
How You’ll Benefit
This class will help you:
Learn about and practice configuring Cisco Identity-Based Networking Services solutions at your own pace
Build your skills using Cisco Identity-Based Networking Services (IBNS) to secure network connectivity and resources.
Who Should Enroll
Security architects
Design engineers
Network engineers
Cisco integrators and partners
Course Objectives
After taking this course, you should be able to:
Describe Cisco Identity-Based Networking Services (IBNS) for providing access control to corporate networks.
Describe Extensible Authentication Protocol (EAP) authentication types and methods, and the role of Remote Authentication Dial-In User Service (RADIUS) in EAP communications.
Describe how to configure Cisco Catalyst switches, Cisco Wireless LAN Controllers (WLCs), and Cisco ISE for 802.1X operation.
Describe how to configure access for non-supplicant devices in an 802.1X deployment.
Describe how to plan and deploy Cisco IBNS Networks with Cisco ISE and 802.1X.
Course Prerequisites
To fully benefit from this course, you should have knowledge of these topics:
Cisco wireless LAN controllers
Basic command-line configuration of Cisco Catalyst switches
Microsoft Windows Server Active Directory
Here are some recommended Cisco learning offerings that can help you meet these prerequisites:Cisco CCNA® Security Certification training
Cisco CCNA Routing and Switching Certification training
Cisco CCNA Wireless Certification training
Housley has over 50 years experience in technical training development and delivery, and a Cisco Learning Partner for 23 years delivering Cisco training in Australia, the APAC region and beyond. Housley’s best in class Instructors and Consultants have the wealth of experience from the classroom to the field, and back.
The Housley team has a strong track record within the Cisco ecosystem focussing on building capability of ICT professionals through our training, mentoring, and consulting services on Cisco products and solutions.
The nationally recognised Statement of Attainment in Digital Security Basics equips you with the fundamental skills and knowledge in personal and organisational digital security. Learn to recognise cyber security risks and gain and introduction to computer networking concepts.
According to the Australian Cyber Security Centre, a cyber-attack was reported every 8 minutes during the last financial year. That’s an increase of 13% and the losses from cybercrime totalled more than an eye-watering $33 billion in the same period.
Delve into the world of cyber security and become a trusted professional in a fast-growing industry. In a world where cyber attacks are constantly on the rise, there has never been a better time to gain in-demand skills that can set you up for a lucrative career in cyber security.
Certified Information Security Manager (CISM) is a certification for information security managers awarded by ISACA (formerly the Information Systems Audit and Control Association).
Big data needs big protection. In just the last two years, 90 percent of the world’s data has been created. As computer networks grow, so too does the quantity of vulnerable information.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy